Supercharge Your Innovation With Domain-Expert AI Agents!

Application program protection method and equipment

An application and device protection technology, applied in the field of software protection, can solve problems such as unfavorable application copyright protection, and achieve the effect of being beneficial to copyright protection

Inactive Publication Date: 2013-03-20
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF4 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In view of the above problems, in the existing software protection technology, the developer usually encrypts the application program through the software encryption device, and then decrypts the application program and runs it through the secure operation device on the terminal. The encryption method in the prior art is usually a fixed password or a password set according to fixed rules, when the application is successfully deciphered once, because the password has been obtained, it will be transferred and installed by the user to other terminals for unrestricted operation and use, which is still not conducive to the copyright protection of the application

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application program protection method and equipment
  • Application program protection method and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] In the prior art, the encryption of the application is usually done on the developer side, and the encryption methods are different, which increases the workload of the developer; at the same time, the application encrypted by the existing technology can be transferred and installed after it is successfully cracked once. Using it in other terminals seriously infringes the developer's copyright rights and interests, and is not conducive to the unified charging management of the application by the application store. figure 1 It is a schematic flow chart of an application protection method provided by an embodiment of the present invention, such as figure 1 As shown, this embodiment provides an application protection method, including:

[0019] Step 110: Read the second user identifier of the second mobile terminal that needs to run the application.

[0020] Specifically, after a certain second mobile terminal obtains the application, when it needs to run the application, first ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an application program protection method and equipment; the method comprises the following steps that the second user identification of a second mobile terminal which needs to run an application program is read; the second user identification is compared with stored first user identification, wherein the first user identification is the user identification for buying the application program; if a comparison result is consistent, the application program is decrypted according to the first user identification, and the second mobile terminal is allowed to run the application program; and if the comparison result is inconsistent, the decryption of the application program is rejected. According to the technical scheme provided by the invention, because the decryption of the application program is related to the user identification for buying the application program, the application program cannot be transferred to other terminals by a user after being decrypted successfully, and the copyright of the application program is protected.

Description

Technical field [0001] The embodiments of the present invention relate to software protection, and in particular to an application program protection method and device. Background technique [0002] With the rapid development of the mobile Internet, applications suitable for mobile terminals are becoming more abundant, and users are using more and more applications. However, there are some problems at present. For example, for mobile terminals on the Android platform, users can often avoid the charging channels of app stores and download and install apps through various other channels, resulting in loss of rights and interests of developers and app stores. Other types of mobile terminal operating system platforms also encounter such problems. Therefore, issues concerning the protection of the economic interests of application developers and the protection of applications from cracking have gradually attracted attention. [0003] To solve the above problems, in the existing softwa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/12
Inventor 郑明王志军王蓉张尼刘镝
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More